What happened
Attackers are abusing Discord to deliver a clipboard hijacker that intercepts cryptocurrency wallet addresses. The malware, delivered via Discord channels and direct messages, replaces copied wallet addresses with attacker-controlled addresses. Researchers from CloudSEK analyzed the attack, noting that it exploits users’ clipboard operations to steal crypto assets during routine transactions. The campaign employs lightweight loaders, obfuscation, and social engineering to trick users into executing the payload. Once installed, the malware monitors clipboard content continuously, redirecting funds without user awareness.
Who is affected
Cryptocurrency users operating on Discord, including individuals and communities exchanging wallet addresses, face direct exposure to fund theft.
Why CISOs should care
This malware demonstrates how social platforms can be leveraged to compromise financial assets, introducing both operational and reputational risk for organizations or users handling cryptocurrency.
3 practical actions
- Educate users on social engineering: Warn users about malicious links and executable files distributed via messaging platforms.
- Monitor clipboard and transaction activity: Implement detection for unusual wallet address substitutions.
- Restrict execution of unverified software: Apply application control to prevent unauthorized binaries from running.
